Author Archives: Steve Prentice

Facebook: Your At-work Social Network

Facebook: Your At-work Social Network

Social Network The unofficial divide between LinkedIn and FaceBook is about to get a whole lot fuzzier, with the January 2015 soft release of “Facebook at Work,” a social platform for the workplace. According to an entry in the Wall Street Journal’s Tech Blog, “the product is being tested in fewer than a dozen companies…

The Cat Within – Google Image Recognition

The Cat Within – Google Image Recognition

Google can see cats The unofficial star of the Internet is the cat. As a running joke concerning the ease by which time can be wasted online, cat videos and the grumpy cat are recurring stars. Google has now reinjected legitimacy into this cultural meme by using visuals of cats as a flagship for its new…

Project Loon – From Wi-Fi to High-Fi

Project Loon – From Wi-Fi to High-Fi

Project Loon Although the Internet appears universal and omnipresent to those who use it, the majority of the world still lacks access to it, due to many factors, including economics, terrain, political instability and straight-up poverty. A handful of high-profile Internet giants is setting about changing that, by changing the way the Internet signal travels: instead of…

IBM and Apple promises to make apps more sticky

IBM and Apple promises to make apps more sticky

Creating Apps that Stick A new partnership between IBM and Apple promises to make apps more sticky and responsive. Speaking at the IBM XCITE 2014 conference recently in Singapore, Tim Greisinger, IBM vice president for its Smarter Cities arm discussed the shortfalls of current apps and the potential for this marriage of industry behemoths moving…

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

EMC Answers The Call For up-to-the Minute Cloud Infrastructure Education

EMC Answers The Call For up-to-the Minute Cloud Infrastructure Education

EMC Answers The Call For Up-To-The Minute Cloud Infrastructure Education Building and managing cloud infrastructure is not easy. Comprising a collection of fast-changing technologies that compete with shifting policies and laws, user needs, and corporate objectives, it requires technical knowledge paired with the skills to talk to non-technical decision-makers as well as programmers and software…

How The Cloud Is Changing Disaster Recovery

How The Cloud Is Changing Disaster Recovery

How the Cloud is Changing Disaster Recovery Anyone who is a regular reader of this site will know about the cloud’s numerous benefits. Using the cloud can provide businesses with cost-effective resource usage, rapid provisioning, easy scalability and flexible elasticity – benefits that simply don’t exist when using local on-site servers and services. One of…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

The Growth Of Rampant Digital Diseases

The Growth Of Rampant Digital Diseases

Rampant Digital Diseases Keeping ‘Rombertik’ at Bay – The New Malware that Destroys Hard-Drives A new form of malware is still on the loose, and this one takes malicious to a whole new level. Nicknamed ‘Rombertik’ by Cisco Systems, the malware attempts to infiltrate the victim’s browser to procure confidential information; fairly standard operating procedure…

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising